暂无分享,去创建一个
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Refik Molva,et al. Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.
[3] Panagiotis Papadimitratos,et al. Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .
[4] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[5] Mun Choon Chan,et al. MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network , 2010, 2010 Proceedings IEEE INFOCOM.
[6] M. Hansen,et al. Participatory Sensing , 2019, Internet of Things.
[7] Juan-Carlos Cano,et al. Providing accident detection in vehicular networks through OBD-II devices and Android-based smartphones , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[8] Panagiotis Papadimitratos,et al. Towards deploying a scalable & robust vehicular identity and credential management infrastructure , 2014, 2014 IEEE Vehicular Networking Conference (VNC).
[9] Sha Tao,et al. Securing smartphone based ITS , 2011, 2011 11th International Conference on ITS Telecommunications.
[10] Panagiotis Papadimitratos,et al. Resilient Collaborative Privacy for Location-Based Services , 2015, NordSec.
[11] Apu Kapadia,et al. Opportunistic sensing: Security challenges for the new paradigm , 2009, 2009 First International Communication Systems and Networks and Workshops.
[12] James A. Landay,et al. UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits , 2009, CHI.
[13] Liviu Iftode,et al. The cyber-physical bike: a step towards safer green transportation , 2011, HotMobile '11.
[14] Kpatcha M. Bayarou,et al. Copra: Conditional pseudonym resolution algorithm in VANETs , 2013, 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS).
[15] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[16] Panagiotis Papadimitratos,et al. Privacy-Preserving Relationship Path Discovery in Social Networks , 2009, CANS.
[17] J.-P. Hubaux,et al. Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.
[18] Ram Dantu,et al. Safe Driving Using Mobile Phones , 2012, IEEE Transactions on Intelligent Transportation Systems.
[19] Xiaolei Dong,et al. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs , 2015, IEEE Transactions on Information Forensics and Security.
[20] Panagiotis Papadimitratos,et al. SEVECOM - Secure Vehicle Communication , 2006 .
[21] Panagiotis Papadimitratos,et al. SHIELD: a data verification framework for participatory sensing systems , 2015, WISEC.
[22] Panagiotis Papadimitratos,et al. SEROSA: SERvice oriented security architecture for Vehicular Communications , 2013, 2013 IEEE Vehicular Networking Conference.
[23] Panagiotis Papadimitratos,et al. SPPEAR: security & privacy-preserving architecture for participatory-sensing applications , 2014, WiSec '14.
[24] Panagiotis Papadimitratos,et al. The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems , 2015, IEEE Vehicular Technology Magazine.
[25] Panagiotis Papadimitratos,et al. On the Performance of Secure Vehicular Communication Systems , 2011, IEEE Transactions on Dependable and Secure Computing.
[26] Panagiotis Papadimitratos,et al. VeSPA: vehicular security and privacy-preserving architecture , 2013, HotWiSec '13.
[27] Xiaodong Lin,et al. Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[28] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.
[29] Michael Weber,et al. V-Tokens for Conditional Pseudonymity in VANETs , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[30] Deepak Kshirsagar,et al. Privacy and Security: Online Social Networking , 2013 .
[31] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[32] Panos Kalnis,et al. Providing K-Anonymity in location based services , 2010, SKDD.
[33] Panagiotis Papadimitratos,et al. Ieee Transactions on Dependable and Secure Computing, Special Issue on " Security and Privacy in Mobile Platforms " , 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration , 2022 .
[34] Fan Ye,et al. Mobile crowdsensing: current state and future challenges , 2011, IEEE Communications Magazine.
[35] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[36] Panagiotis Papadimitratos,et al. Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems , 2015, IEEE Transactions on Intelligent Transportation Systems.
[37] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[38] Tarek F. Abdelzaher,et al. GreenGPS: a participatory sensing fuel-efficient maps application , 2010, MobiSys '10.
[39] Hovav Shacham,et al. Group signatures with verifier-local revocation , 2004, CCS '04.
[40] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[41] Azzedine Boukerche,et al. HyDi: a hybrid data dissemination protocol for highway scenarios in vehicular ad hoc networks , 2012, DIVANet@MSWiM.
[42] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[43] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[44] Frank Kargl,et al. Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes , 2014, 2014 IEEE Vehicular Networking Conference (VNC).
[45] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[46] Frank Kargl,et al. PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET) , 2014, 2014 IEEE Vehicular Networking Conference (VNC).
[47] Panos Kalnis,et al. MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries , 2007, SSTD.
[48] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[49] Zhendong Ma,et al. Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).
[50] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[51] Eylem Ekici,et al. Wireless Access in Vehicular Environments , 2009, EURASIP J. Wirel. Commun. Netw..